CVE-2025-43855: CWE-248: Uncaught Exception in trpc trpc
tRPC allows users to build & consume fully typesafe APIs without schemas or code generation. In versions starting from 11.0.0 to before 11.1.1, an unhandled error is thrown when validating invalid connectionParams which crashes a tRPC WebSocket server. This allows any unauthenticated user to crash a tRPC 11 WebSocket server. Any tRPC 11 server with WebSocket enabled with a createContext method set is vulnerable. This issue has been patched in version 11.1.1.
AI Analysis
Technical Summary
CVE-2025-43855 is a high-severity vulnerability affecting the tRPC library versions from 11.0.0 up to but not including 11.1.1. tRPC is a framework that enables developers to build and consume fully typesafe APIs without requiring schemas or code generation. The vulnerability arises from an unhandled exception triggered during the validation of invalid connection parameters (connectionParams) in the WebSocket server implementation of tRPC. Specifically, when a client attempts to establish a WebSocket connection with malformed or invalid connection parameters, the server throws an uncaught exception, causing the WebSocket server to crash. This crash leads to a denial of service (DoS) condition. The vulnerability affects any tRPC 11 server that has WebSocket enabled and uses a createContext method, which is common in many implementations to provide contextual data per request. Importantly, exploitation requires no authentication or user interaction, making it trivially exploitable by any unauthenticated attacker who can reach the WebSocket endpoint. The issue has been addressed in tRPC version 11.1.1, where proper error handling for invalid connection parameters was implemented to prevent server crashes. The CVSS 4.0 base score of 8.7 reflects the high impact on availability due to the server crash, combined with the ease of exploitation (network vector, no privileges or user interaction required). No known exploits are currently reported in the wild, but the vulnerability presents a significant risk for denial of service attacks against affected tRPC WebSocket servers.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential for denial of service attacks against backend services using tRPC with WebSocket enabled. Such a DoS could disrupt critical API services, leading to downtime, degraded user experience, and potential cascading failures in dependent systems. Organizations relying on real-time or interactive applications using tRPC WebSocket connections—such as financial services platforms, e-commerce, or public sector digital services—may face service interruptions. The vulnerability does not directly compromise confidentiality or integrity but can cause significant operational impact and potential reputational damage. Additionally, attackers could use this vulnerability as a vector to distract or mask other malicious activities. Given the ease of exploitation and lack of authentication requirements, attackers could launch automated attacks at scale, affecting multiple organizations simultaneously. The absence of known exploits in the wild currently provides a window for mitigation before widespread exploitation occurs.
Mitigation Recommendations
European organizations should immediately audit their use of tRPC, specifically checking for versions >= 11.0.0 and < 11.1.1 with WebSocket enabled and createContext methods implemented. The primary mitigation is to upgrade all affected tRPC instances to version 11.1.1 or later, where the vulnerability is patched. If immediate upgrade is not feasible, organizations should consider implementing WebSocket connection filtering to validate and block malformed connectionParams at the network or application gateway level. Rate limiting and IP reputation filtering on WebSocket endpoints can reduce the risk of automated exploitation attempts. Additionally, implementing robust monitoring and alerting on WebSocket server crashes or restarts can provide early detection of exploitation attempts. Organizations should also review their incident response plans to handle potential denial of service incidents and communicate with stakeholders about possible service disruptions. Finally, developers should adopt secure coding practices to handle exceptions gracefully and avoid server crashes from malformed inputs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2025-43855: CWE-248: Uncaught Exception in trpc trpc
Description
tRPC allows users to build & consume fully typesafe APIs without schemas or code generation. In versions starting from 11.0.0 to before 11.1.1, an unhandled error is thrown when validating invalid connectionParams which crashes a tRPC WebSocket server. This allows any unauthenticated user to crash a tRPC 11 WebSocket server. Any tRPC 11 server with WebSocket enabled with a createContext method set is vulnerable. This issue has been patched in version 11.1.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-43855 is a high-severity vulnerability affecting the tRPC library versions from 11.0.0 up to but not including 11.1.1. tRPC is a framework that enables developers to build and consume fully typesafe APIs without requiring schemas or code generation. The vulnerability arises from an unhandled exception triggered during the validation of invalid connection parameters (connectionParams) in the WebSocket server implementation of tRPC. Specifically, when a client attempts to establish a WebSocket connection with malformed or invalid connection parameters, the server throws an uncaught exception, causing the WebSocket server to crash. This crash leads to a denial of service (DoS) condition. The vulnerability affects any tRPC 11 server that has WebSocket enabled and uses a createContext method, which is common in many implementations to provide contextual data per request. Importantly, exploitation requires no authentication or user interaction, making it trivially exploitable by any unauthenticated attacker who can reach the WebSocket endpoint. The issue has been addressed in tRPC version 11.1.1, where proper error handling for invalid connection parameters was implemented to prevent server crashes. The CVSS 4.0 base score of 8.7 reflects the high impact on availability due to the server crash, combined with the ease of exploitation (network vector, no privileges or user interaction required). No known exploits are currently reported in the wild, but the vulnerability presents a significant risk for denial of service attacks against affected tRPC WebSocket servers.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential for denial of service attacks against backend services using tRPC with WebSocket enabled. Such a DoS could disrupt critical API services, leading to downtime, degraded user experience, and potential cascading failures in dependent systems. Organizations relying on real-time or interactive applications using tRPC WebSocket connections—such as financial services platforms, e-commerce, or public sector digital services—may face service interruptions. The vulnerability does not directly compromise confidentiality or integrity but can cause significant operational impact and potential reputational damage. Additionally, attackers could use this vulnerability as a vector to distract or mask other malicious activities. Given the ease of exploitation and lack of authentication requirements, attackers could launch automated attacks at scale, affecting multiple organizations simultaneously. The absence of known exploits in the wild currently provides a window for mitigation before widespread exploitation occurs.
Mitigation Recommendations
European organizations should immediately audit their use of tRPC, specifically checking for versions >= 11.0.0 and < 11.1.1 with WebSocket enabled and createContext methods implemented. The primary mitigation is to upgrade all affected tRPC instances to version 11.1.1 or later, where the vulnerability is patched. If immediate upgrade is not feasible, organizations should consider implementing WebSocket connection filtering to validate and block malformed connectionParams at the network or application gateway level. Rate limiting and IP reputation filtering on WebSocket endpoints can reduce the risk of automated exploitation attempts. Additionally, implementing robust monitoring and alerting on WebSocket server crashes or restarts can provide early detection of exploitation attempts. Organizations should also review their incident response plans to handle potential denial of service incidents and communicate with stakeholders about possible service disruptions. Finally, developers should adopt secure coding practices to handle exceptions gracefully and avoid server crashes from malformed inputs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-17T20:07:08.555Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec871
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 1:27:16 PM
Last updated: 8/12/2025, 6:59:22 AM
Views: 26
Related Threats
CVE-2025-55716: CWE-862 Missing Authorization in VeronaLabs WP Statistics
MediumCVE-2025-55714: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Crocoblock JetElements For Elementor
MediumCVE-2025-55713: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in CreativeThemes Blocksy
MediumCVE-2025-55712: CWE-862 Missing Authorization in POSIMYTH The Plus Addons for Elementor Page Builder Lite
MediumCVE-2025-55710: CWE-201 Insertion of Sensitive Information Into Sent Data in Steve Burge TaxoPress
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.